PrepAway - Latest Free Exam Questions & Answers

Tag: which two methods will help to mitigate an attacker intercepting data with a rogue

Which two methods will help to mitigate this type of activity?

Look at the exhibit:
You suspect an attacker in your network has configured a rogue layer 2 device to intercept traffic from multiple VLANS, thereby allowing the attacker to capture potentially sensitive data. Which two methods will help to mitigate this type of activity? (Choose two.)